crac

Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
Published By: Alcatel-Lucent     Published Date: Sep 30, 2009
Ensuring the reliability and efficiency of your data center operations requires a strategic partner that is qualified to minimize energy usage, reduce costs, and optimize space utilization, helping you meet critical business initiatives.
Tags : 
alcatel lucent, power, cooling, eco-sustainability, modular cooling, crac, opex
    
Alcatel-Lucent
Published By: Intel     Published Date: Jul 17, 2019
The need for identity protection has never been stronger. Identity theft accounted for 74 percent of all data breaches in the first half of 2017, and costs associated with cybercrime are expected to reach $6 trillion annually by 2021. Any time an employee's username and password are compromised, your business is vulnerable. Eight-character passwords that changed every 90 days worked well a decade ago, but increasingly commonplace attack methods like password cracking, phishing, or screen scraping call for a new kind of protection.
Tags : 
    
Intel
Published By: illusive networks     Published Date: May 18, 2016
The only way to stop cyber attackers in their tracks is to learn to think like an attacker. To give you better insight into what tools attackers are using, we've compiled a list of 15 "must-have" tools for aspiring attackers. Download this guide and learn about Open source tool cyber attackers use, such as Kali Linux and Wireshark, Password cracking tools that automatically test all possible combinations , and Tools such as Nmap, which lets users "map" a target network and its ports.
Tags : 
    
illusive networks
Published By: HP Inc.     Published Date: Jun 12, 2018
HP scientists had a bright idea. If they could modify materials to absorb infrared light – the light we can’t see – they could successfully fuse color to that material. It’s a story of how HP “cracked the code” in 3D color printing by drawing upon deep experience in the science of ink. Read this innovation story to why HP Jet Fusion 300/500 3D printers make it possible to produce engineering-grade functional parts faster and more affordably. Download HP’s innovation story
Tags : 
    
HP Inc.
Published By: athenahealth     Published Date: Apr 30, 2013
Traditional EMRs consistently fail to help physicians make more money, do less work, and deliver better care. High up-front fees with traditional EMRs are one factor, but the greatest problem with traditional EMRs is that they are designed without an understanding of the fundamental economics of a patient encounter.
Tags : 
patient workflow, ehr, physician, meaningful use, analytics, data
    
athenahealth
Published By: Concur ENT     Published Date: May 11, 2018
VAT rules can be complex, HMRC – a gauntlet. In this eBook, we demystify some of the facts around compliance, tax and expense management. The British economy has gone from boom to bust. The recession followed by a long period of austerity and caution has altered spending behaviours while the government has increasingly cracked down on tax evasion and fraud. HMRC has become more focused on assisting businesses of all sizes to comply with their policies and implement good governance when it comes to finances. Nevertheless, the reality can sometimes be confusing and the penalties for getting it wrong – severe. Many businesses outsource their tax management to experts or muddle through, running the risk of non-compliance. There’s a real need for unambiguous, helpful advice about expenses, VAT and HMRC compliance. We’ve created this guide to help shine some light on the processes, practices and behaviours around tax and expenses based on some of the frequently asked questions we receive. Wh
Tags : 
    
Concur ENT
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : 
data security, passwords, password protection, data vulnerability
    
Citrix ShareFile
Published By: HP Inc.     Published Date: Apr 11, 2018
HP scientists had a bright idea. If they could modify materials to absorb infrared light – the light we can’t see – they could successfully fuse color to that material. It’s a story of how HP “cracked the code” in 3D color printing by drawing upon deep experience in the science of ink. Read this innovation story to why HP Jet Fusion 300/500 3D printers make it possible to produce engineering-grade functional parts faster and more affordably. Download HP’s innovation story
Tags : 
    
HP Inc.
Published By: Delphix EMEA     Published Date: Jan 17, 2019
“In the rush to develop apps faster and deliver more, it’s easier than ever for things to fall through the cracks, like every hasty +1’ed dev/test environment creating a potential security minefield of unmasked sensitive fields. Without the right dev processes, it’s not just security that suffers. With the typical developer spending around 12-hours a week on tasks like setting up and configuring environments or relying on worthless fake data, productivity and quality often fall victim too. Download the Developer Confessions chapter to discover the biggest frustrations we hear from developers, how to balance access to data with data security, and proven ways to speed up developer productivity.”
Tags : 
    
Delphix EMEA
Published By: Oracle     Published Date: Sep 30, 2019
In the past, B2B transactions occurred in face-to-face meetings as a sales professional worked a product demo, business luncheon, or boardroom presentation to influence a customer – and close the deal. Today, however, B2B stakeholders perform much of their product and service research online. In fact, 93 percent of B2B buying starts with online searching, according to a Pinpoint Market Research study. This research occurs long before a customer engages with sales. As your prospects research and evaluate your offerings, they leave behind valuable clues to their intent. Understanding these clues – cracking the code – can help you tailor your messages to them, thereby providing them a more tailored, relevant experience. As a result, business-savvy marketing and sales departments have embraced marketing automation platforms, so their respective teams can work together on one common platform, reach B2B customers online, and drive revenue. Marketing automation platforms automate repetitive
Tags : 
    
Oracle
Published By: Pindrop Security     Published Date: Sep 24, 2018
With physical and online information security always growing stronger and harder to crack, fraudsters gravitate toward the weakest link in your security—your contact center and voice channels. For many years, our annual fraud reports have shown that fraudsters increasingly exploit the phone channel. Fraud rates continue to increase every year, and this year is no different. Between 2016 (1 in 937 calls) and 2017 (1 in 638 calls), the overall voice channel fraud rate increased by 47%, continuing on the upward trend from last year 113% increase.1 From 2013 through 2017 we have seen the fraud rate climb over 350%, with no signs of slowing down. It is important to note, that some verticals (i.e. Retail) experience even higher fraud rates than shown here.
Tags : 
    
Pindrop Security
Published By: MeQuilibrium     Published Date: Aug 01, 2019
Skills shortages are keeping business leaders up at night. In fact, nearly half of executives say this skills gap is a major concern for the future of their organization — yet only 3% are significantly increasing training budgets. Why? Workplace learning is a difficult nut to crack. Organizations often struggle to reskill their adult workforces with hard skills because they’re taking the wrong approach. In this white paper, we take a look at why soft skills are not only integral for the future of work, but why they’re actually necessary for developing hard skills too. You’ll also learn: ? How soft skills can lead to dramatic shifts in how people think ? How soft skills improve our ability to learn ? The most important skill for the 21st century — and how it can boost learning by 30% Discover why empowering your people with soft skills is critical to unlocking the future success of your business. Download Now
Tags : 
    
MeQuilibrium
Published By: Shape Security     Published Date: Sep 16, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security
Published By: Pega     Published Date: Sep 11, 2015
Download Dynamic Case Management For Dummies, and: -Get to know DCM, software that helps people get work done to optimal outcomes -Expect the unexpected — DCM improves the efficiency of both planned and unplanned work -Improve customer experience — DCM manages work across silos and ensures that nothing falls between the cracks -Bring DCM to your business — discover how you can use DCM to lead change in the enterprise
Tags : 
    
Pega
Published By: Aldon     Published Date: Jan 13, 2009
Automate compliance to reduce bureaucracy and boost efficiency.
Tags : 
aldon, application lifecycle management, alm, automate compliance, reduce bureaucracy
    
Aldon
Published By: Jive Software     Published Date: Dec 02, 2014
Join Jive and Rajat Paharia -- "the father of gamification" -- for a discussion on how to better motivate, engage, and create true loyalty. Jive is digging into the hottest books in the social collaboration space. Join the Jive Book Club for exclusive invites to webinars with the authors, an invite to the Jive Community group to share your thoughts with your peers and the chance to win prizes – you might even learn something new! Their first selection is Loyalty 3.0: How Big Data & Gamification are Revolutionizing Customer & Employee Engagement by Rajat Paharia — the “father of gamification.” Loyalty 3.0 is a Wall Street Journal and New York Times best-seller that cracks the code on the ways big data and gamification can motivate, engage, and create true loyalty your customers, employees, and partners.
Tags : 
employee engagement, customer engagement, social collaboration, big data, emerging marketing, crm & customer care, marketing research, data management/analytics
    
Jive Software
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : 
pdf protection, data security, password protection, hacker prevention
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do Passwords Really Protect Your PDFs? Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : 
password protection, account management, document protection, data protection, data management, password vulnerability, encryption, data integration, software security, storage backup
    
Citrix ShareFile
Published By: Trend Micro SPN     Published Date: Jun 15, 2009
Power to the people? Managing technology democracy in the Workplace. A Trend Micro sponsored report by the Economist Intelligence Unit.
Tags : 
trend, trend micro, economist intelligence unit, security, risks, technology democracy, cio, cto, team, human resources management, eiu, technology director, risks
    
Trend Micro SPN
Published By: The Economist Group     Published Date: Feb 13, 2019
This paper will highlight our five key findings to achieve more successful content marketing campaigns. Brands can use these insights pre-mid-and post-campaign to maximise marketing ROI.
Tags : 
marketing, digital marketing, marketing roi, content marketing, social media marketing, lead generation, social media, content management systems, market research, mobile marketing, lead generation & automation
    
The Economist Group
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: OnForce     Published Date: Apr 22, 2007
“8 Ways Every Solution provider Can Profit from Rollouts Now” demonstrates how rollouts are creating strong sales opportunities for solution providers of all sizes. Importantly, it also addresses how solution providers have finally “cracked the code” of transforming this high-volume business, which is extremely service intensive, into a high-profit business via innovative on-site service delivery models that let them find the contract IT service professionals they need, right when they need them.
Tags : 
service model, roll-out, rollout, roll-outs, rollouts, customer service, var, vars, value-add, reseller, lead generation, marketplace, on force, onforce, roll out, roll outs, on-site, asp, service provider
    
OnForce
Published By: Numara Software     Published Date: Jul 16, 2009
Find out how Numara Track-It! can help you build better processes, manage organizational knowledge and solve problems quickly. Keep issues from falling through the cracks and efficiently manage help desk requests as well as other processes that require request management: • Optimize help desk efficiency with easy to use systems • Empower customers with self service • Improve productivity with automated alerts, notifications and assignments • Reduce diagnostic time with knowledge management • Reduce resolution time with asset and work order history
Tags : 
help desk, track it, numara, customer management, best practices, customer satisfaction, self service, knowledge management, asset, work order, request management, alerts, sla, service level agreement, performance evaluation, dashboard
    
Numara Software
Published By: SAS     Published Date: Mar 14, 2014
This paper will discuss the barriers to data-driven decision making for midsized businesses, and how experts and non-experts alike can use SAS Visual Analytics to unlock the value of data – including big data – to increase revenue, cut operational costs and better manage their business.
Tags : 
sas, bottom line, midsized businesses, leveraging data, data management, internal and external, decision making, big data, operational costs, decision support, operational execution, strategic analysis, predictive analytics, data landscape, real-time data, interactivity, data democracy, visual analytics
    
SAS
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.